The Bits and Bytes of Computer Networking
Networking Basics
1.
Question 1
Which protocol provides mechanisms ensuring data is reliably delivered?
1 / 1 point
Transmission Control Protocol (TCP)
Internet Protocol (IP)
Dynamic Host Configuration Protocol (DHCP)
User Datagram Protocol (UDP)
2.
Question 2
Select the right order of the TCP/IP Five-layer network model.
1 / 1 point
Physical Layer > Data link Layer > Transport Layer > Network Layer > Application Layer
Physical Layer > Data Link Layer > Network Layer > Transport Layer > Application Layer.
Physical Layer > Application Layer > Data link Layer > Network Layer > Transport Layer
Physical Layer > Network Layer > Data link Layer > Transport Layer > Application Layer
3.
Question 3
Which layer of the network model includes specifications for cables and connectors and how signals are sent over these connections?
1 / 1 point
Data link
Transport
Network
Physical
4.
Question 4
True or false: Fiber cables use pulses of light to represent the ones and zeros of data.
1 / 1 point
True
False
5.
Question 5
What is a network with only a single device at each end of the link called?
1 / 1 point
A switching hub
A collision domain
A twisted pair network
A point to point connection
6.
Question 6
Which of the following is a device that knows how to forward traffic between independent networks?
1 / 1 point
Router
Client
Switch
Hub
7.
Question 7
True or false: Most devices are purely a server or a client.
1 / 1 point
True
False
8.
Question 8
Fill in the blank: When data flows across a cable in both directions, this is known as_____ communication.
1 / 1 point
Duplex
Cross talk
Simplex
Ethernet
9.
Question 9
Fill in the blank: There will almost always be some troubleshooting data available through_____.
1 / 1 point
Action LEDs
Stop LEDs
Wire lights
Port lights
10.
Question 10
Which layer abstracts away the need for any other layers to care about what hardware is in use?
1 / 1 point
Physical
Data Link
Transport
Network
11.
Question 11
What does the letter B represent in a Media Access Control (MAC) address?
1 / 1 point
15
9
10
11
12.
Question 12
Which section in an ethernet frame contains the data from higher layers, such as Internet Protocol (IP) and the transport and application layers?
1 / 1 point
Preamble
Frame Check Sequence
Payload
EtherType
The Network Layer
1.
Question 1
What is eight bits of data called?
1 / 1 point
Octoploid
Octuplet
Figure eight
Octet
2.
Question 2
A single octet in an IP address represents what range of decimal numbers?
1 / 1 point
0-155
1-255
0-250
0-255
3.
Question 3
In a datagram, what does the flag field indicate?
1 / 1 point
If a datagram should be scanned for viruses
If a datagram has degraded and become unusable
If a datagram is high or low priority
If a datagram is allowed to or has already been fragmented
4.
Question 4
Which IP address is Class C?
1 / 1 point
172.38.14.72
128.42.39.72
192.37.48.98
224.24.45.69
5.
Question 5
What does ARP stand for?
1 / 1 point
Address Resolution Protocol
Augmented Resolution Picture
Anonymous Resource Protocol
Aggressive Resource Protection
6.
Question 6
What does CIDR stand for?
1 / 1 point
Classless Inter-Domain Routing
Classic Intra-Demo Ratings
Clear Inter-Developer Relations
Costless Inter-Data Routing
7.
Question 7
A router is performing basic routing functions. What is the first step in the transmission of a packet?
0 / 1 point
Check the routing table.
Sent an ARP response.
The router examines the destination IP of this packet.
A router receives a packet of data.
8.
Question 8
Interior gateway protocols are used by routers in order to share information within a single…
1 / 1 point
subnet
destination network
autonomous system
collision domain
9.
Question 9
What protocol communicates data between routers representing the edges of autonomous systems?
1 / 1 point
Distance-vector
Exterior gateway
Interior gateway
Link state
10.
Question 10
Which of the following IP address ranges have been defined as non-routable address space? Select all that apply.
1 / 1 point
172.16.0.0/12
255.255.255.0/1
10.0.0.0/8
192.168.0.0/16
The Transport and Application Layer
1.
Question 1
Nodes on a network have the ability to direct traffic toward many different receiving services. What provides this ability in the transport layer?
0 / 1 point
Demultiplexing
Multiplexing
Socket address
File Transfer
2.
Question 2
Which field in a Transmission Control Protocol (TCP) header is chosen from ephemeral ports?
1 / 1 point
Source port
Sequence number
Acknowledgement number
Destination port
3.
Question 3
A Transmission Control Protocol (TCP) connection is established and two devices ensure that they’re speaking the same protocol. What has occurred?
1 / 1 point
Handwaving
Four-way handshake
Two-way handshake
Three-way handshake
4.
Question 4
A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?
1 / 1 point
FIN_WAIT
CLOSED
CLOSE_WAIT
FINISHED
5.
Question 5
Connection-oriented protocols protect against dropped data by forming connections and using a constant stream of what?
1 / 1 point
Verifiers
Acknowledgements
Recognition
Approvals
6.
Question 6
In the OSI network model, the ________ is responsible for facilitating the communication between actual applications and the transport layer.
0 / 1 point
presentation layer
session layer
physical layer
application layer
7.
Question 7
One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed segments. Which Transmission Control Protocol (TCP) flag will be used?
1 / 1 point
SYN
RST
PSH
FIN
8.
Question 8
Application layer data lives in the _____ section of the transport layer protocol.
1 / 1 point
header
flags
footer
payload
9.
Question 9
Ports that are generally used to establish outbound connections are known as ______ ports.
1 / 1 point
registered
reserved
ephemeral
system
10.
Question 10
A communication between two devices is over the maximum limit of an ethernet frame size. The Transmission Control Protocol (TCP) splits up the data into segments. Which field in the header helps keep track of the many segments?
1 / 1 point
Sequence number
Checksum
Urgent pointer
Acknowledgement number
The Five-Layer Network Model
Use the following scenario to answer the 10 questions below:
You have 3 networks (A, B, and C) and 2 routers (Y and Z).
Network A has an address space of 10.1.1.0/24 and is connected to router Y, using the interface 10.1.1.1.
Network B has an address space of 192.168.1.0/24 and is connected to Router Y, using the interface 192.168.1.254. Network B is also connected with router Z, using the interface of 192.168.1.1.
Network C has an address space of 172.16.1.0/24 and is connected to router Z, using the interface 172.16.1.1. The diagram below represents these connections and interfaces.
1.
Question 1
Computer 1 on network A, with the IP address of 10.1.1.8, wants to send a packet to Computer 2, with the IP address of 10.1.1.10. On which network is computer 2?
1 / 1 point
Network C
Network B
Network A
Not present
2.
Question 2
For what purpose would computer 1 send a FF:FF:FF:FF:FF broadcast ARP message to all nodes on network A?
1 / 1 point
To obtain Router Y’s MAC address
To verify the internet connection
To calculate the TTL
To obtain Computer 2 MAC address
3.
Question 3
If it’s a TCP connection, which is the first segment that computer 1 needs to build?
1 / 1 point
Ethernet frame
IP datagram
TCP segment
handshake
4.
Question 4
What information is in the payload section of the TCP segments?
1 / 1 point
The application layer data
The MAC address of Computer 1
ART Table
Handshake
5.
Question 5
When constructing the Ethernet datagram to send the packet from Router Y to Router Z, what information needs to be in the destination MAC address?
1 / 1 point
Computer 2’s MAC address
Computer 1’s MAC address
Router Y’s MAC address
Router Z’s MAC address
6.
Question 6
Computer 1 on Network A sends a packet to Computer 2 on Network C. What’s the second step that Router Z does after receiving the Ethernet frame?
1 / 1 point
Calculates a checksum and compares this checksum with the one in the Ethernet frame header
Sends an ARP broadcast message
Sends back the packages to router Y for confirmation
Strips away the Ethernet frame, leaving the IP datagram. Performs a checksum calculation against the entire datagram
7.
Question 7
Computer 1 on network A, with IP address of 10.1.1.10, wants to send a packet to Computer 2, with IP address of 192.168.1.14. If the TTL value was set to 64 at the beginning, what is the value of the TTL once it reaches its destination?
1 / 1 point
65
63
0
61
8.
Question 8
Computer 1 on network B, with IP address of 192.168.1.121, wants to send a packet to Computer 2, with IP address of 10.1.1.8. Taking in consideration that computer 1 is sending a request to a web server on computer 2, listening on port 80, and the source port on computer 1 is 5000, which of the following contains the correct information for the first TCP segment of data?
1 / 1 point
Source Port: 80
Destination Port: 5000
Sequence Number: 1
Acknowledgment Number: 2
Source Port: 8081
Destination Port: 50
Sequence Number: 4
Acknowledgment Number: 1
Source Port: 80
Destination Port: 5000
Sequence Number: 1
Acknowledgment Number: 1
Source Port: 5000
Destination Port: 80
Sequence Number: 1
Acknowledgment Number: 2
9.
Question 9
Computer 1 on network B, with IP address of 192.168.1.121, wants to send a packet to Computer 2, with IP address of 172.16.1.57. Which of the following has the correct IP datagram information for the fields: Version, minimum Header Length, Source IP, and Destination IP?
1 / 1 point
Version: 5
Header Length: 16
Source IP Address: 10.1.1.0/24.
Destination IP address: 10.1.1.0/23.
Version: 4
Header Length: 20
Source IP Address: 192.168.1.121
Destination IP address: 172.16.1.57
Version: 6
Header Length: 20
Source IP Address: 8a:1a:2b:3c:4d:5f
Destination IP address: 2a:2b:3c:4d:8f
Version: 4
Header Length: 32
Source IP Address: 10.1.1.1
Destination IP address: 172.16.1.1
10.
Question 10
The Cat6 cable is part of the ______ layer.
1 / 1 point
Physical
Application
Network
Transport
Networking Services
1.
Question 1
A company moves a popular website to a new web host. Which of the following will change as a result?
1 / 1 point
Domain name
Network service
Internet Protocol (IP)
Root name server
2.
Question 2
During the name resolution process, which server does a local recursive server contact first?
1 / 1 point
Caching name server
Authoritative name server
Root name server
Top level domain (TLD) server
3.
Question 3
Which of these protocols is used by DNS?
1 / 1 point
Dynamic Host Configuration Protocol (DHCP)
IP (Internet Protocol)
Hypertext Transfer Protocol (HTTP)
User Datagram Protocol (UDP)
4.
Question 4
Fill in the blank: A DNS record that’s used to redirect traffic from one domain name to another is known as a _______ record.
1 / 1 point
SQA
CNAME
NS
QUAD A
5.
Question 5
Which portion of a domain is known as the ‘www” portion?
1 / 1 point
The Top Level Domain (TLD) name
The Dynamic Host Configuration Protocol (DHCP)
The DNS Resolver
The subdomain
6.
Question 6
Which address does the field in DHPOFFER specify?
0 / 1 point
The Gateway address
The Data Link Layer
The Media Access Control (MAC) address
The Internet Protocol (IP) address
7.
Question 7
Network Address Translation (NAT) is typically implemented with which of these hardware devices?
1 / 1 point
Switches
Hubs
Servers
Routers
8.
Question 8
What technique is used with Network Address Translation (NAT) when a source port chosen by a client is the same port used by a router?
0 / 1 point
Translation
Masquerading
Preservation
Forwarding
9.
Question 9
Which of these technologies uses encrypted tunnels to allow for a remote computer or network to act as if it’s connected to a network that it’s not actually physically connected to?
1 / 1 point
Domain Name System (DNS)
User Datagram Protocol (UDP)
Dynamic Host Configuration Protocol (DHCP)
Virtual Private Network (VPN)
10.
Question 10
Fill in the blank: A service that appears to external clients as a single server, but actually represents many servers behind it, is known as a _____.
1 / 1 point
reverse proxy
VPN
port preservation
multiplexer
Limitations of the Internet
1.
Question 1
A modulator/demodulator is better known as a what?
1 / 1 point
computer
telephone
modem
radio
2.
Question 2
What term is used to refer to any internet connectivity technology that isn’t dial-up?
1 / 1 point
Ethernet
Plain Old Telephone System (POTS)
Broadband
Fast Internet
3.
Question 3
How many T1 lines make up one T3 line?
1 / 1 point
100
3
24
28
4.
Question 4
What is the more accurate name for a DSL modem?
1 / 1 point
ONT
CMTS
POTS
DSLAM
5.
Question 5
What connects lots of different cable connections to an ISP’s core network?
1 / 1 point
ONT
CMTS
POTS
DSLAM
6.
Question 6
What does FTTP stand for?
1 / 1 point
File Transfer Telephone Protocol
Fiber to the People
Fiber Telephone Total Package
Fiber to the Premises
7.
Question 7
A section of the radio spectrum that’s been agreed upon to be used for certain communications is known as a what?
1 / 1 point
A wireless LAN
A frequency band
A collision domain
A channel
8.
Question 8
In which type of wireless configuration do nodes communicate directly with each other, rather than with an access point or any other supporting infrastrucuture?
1 / 1 point
Ad-hoc
Mesh network
802.11b
2.4Ghz
Correct
9.
Question 9
What wireless security method allows you to configure access points to only allow connections from specific physical addresses belonging to devices you trust?
1 / 1 point
5Ghz Channel
Media Access Control (MAC) filtering
Wired Equivalent Privacy (WEP)
WiFi Protected Access (WPA)
10.
Question 10
Cellular networking is also known as ____ networking.
0 / 1 point
computer
mobile
wide area
organic
Troubleshooting and the Future of Networking
1.
Question 1
The ability for a protocol or program to determine that something went wrong is known as ________.
1 / 1 point
data resilience
data verification
error detection
redundancy
2.
Question 2
A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?
1 / 1 point
TTL
ICMP
Echo request
Echo reply
3.
Question 3
Traceroute uses UDP packets by default on which of the following operating systems? (Choose all that apply)
0.75 / 1 point
Windows 7
Linux
Correct
Mac OS
Windows 10
4.
Question 4
When using the netcat command to test a network port, which option will provide output that is not useful for scripting, but is useful for the human eye?
1 / 1 point
-v
-z
-Port
No option is required
5.
Question 5
While in an interactive nslookup session, you’d use the ______ keyword to change the DNS server you’re using.
1 / 1 point
Client
DNS
FQDN
Server
6.
Question 6
When troubleshooting Domain Name System (DNS) problems, which helpful feature do public servers usually support?
0 / 1 point
Paths between nodes
ICMP echo requests
Virtualization services
Port connectivity
7.
Question 7
A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used?
1 / 1 point
Private
Hybrid
Public
Community
8.
Question 8
Internet Protocol (IP) v6 addresses are written out in which format?
1 / 1 point
4 groups of 16 bits
8 groups of 12 bits
8 groups of 16 bits
6 groups of 32 bits
9.
Question 9
Which of the options below represents the correct & most fully compressed version of the IPv6 address: 7d2b:00a9:a0c4:0000:a772:00fd:a523:0358
1 / 1 point
7d2b:a9:a0c4:0:a772:fd:a523
7d2b:a9:a0c4::a772:fd:a523:358
7d2b:00a9:a0c4:0000:a772
7d2b:a9:a0c4:0:a772:fd:a523:358
10.
Question 10
Which Internet Protocol (IP) v6 header field is used to determine the quality of service level for a datagram?
1 / 1 point
Next header
Version
Flow label
Payload length